Resubmissions

15/06/2023, 13:39

230615-qx8z5ahd71 7

14/06/2023, 11:43

230614-nvn6tsgb87 7

Analysis

  • max time kernel
    139s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2023, 13:39

General

  • Target

    cves_windows.exe

  • Size

    5.8MB

  • MD5

    41319760577a0df3145bceb010914526

  • SHA1

    7b4828371f8d0fb7d564757f8c66197a77c3007c

  • SHA256

    777c9220670025a487f4e853987df0482fbd545189137d58a60d4ab37c1cfbb4

  • SHA512

    67aa1638ae3661ebceebede54116372fa9a3dfa59a2106f59c031530e731c258edb1bc2aec55d83b93f52fe84683030ecea23e91b36beeacc5f5526980a96971

  • SSDEEP

    49152:qfUoYl63WYrb/TbvO90d7HjmAFd4A64nsfJBAmZgfk7bJsbsSQOUmzjkbsG0oq+Y:63WvAlJQSG0oGREmT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cves_windows.exe
    "C:\Users\Admin\AppData\Local\Temp\cves_windows.exe"
    1⤵
    • Drops file in Program Files directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:892
    • C:\Windows\system32\schtasks.exe
      C:\Windows\system32\schtasks.exe /CREATE /XML C:\Users\Admin\AppData\Local\Temp\eXPNQyhWavDsNHlDd /F /TN ChromeUpdateTaskMachinCore
      2⤵
      • Creates scheduled task(s)
      PID:1548
    • C:\Windows\System32\cmd.exe
      C:\Windows\System32\cmd.exe /c "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4048
      • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe
        "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Program Files\ChromeUpdateTaskMachinCore\ORsBHaReETgwnMypRf\tor\tor.exe
          "C:\Program Files\ChromeUpdateTaskMachinCore\ORsBHaReETgwnMypRf\tor\tor.exe" -f "C:\Program Files\ChromeUpdateTaskMachinCore\ORsBHaReETgwnMypRf\ORsBHaReETgwn"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Suspicious use of WriteProcessMemory
          PID:3848
          • C:\Program Files\ChromeUpdateTaskMachinCore\ORsBHaReETgwnMypRf\tor\pluggable_transports\obfs4proxy.exe
            "C:\Program Files\ChromeUpdateTaskMachinCore\ORsBHaReETgwnMypRf\tor\pluggable_transports\obfs4proxy.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            PID:1976
        • C:\Windows\System32\wbem\WMIC.exe
          C:\Windows\System32\wbem\WMIC.exe computersystem get model,manufacturer
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4192

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe

          Filesize

          5.8MB

          MD5

          c2df807d8e539814dd85321ea0322307

          SHA1

          95457f6e38554e56fe99e3332cf5445abf7db626

          SHA256

          6b3996afa4cfd8d3bf11765197880d0768aa0acc3190cf19838ba3bbbd2cff7e

          SHA512

          729eeac68c48f31e395a30dc5e0c4558f0882db83926d8d55c9ea994ea6ba613d9c46591de8840e3f92bd493c0c074cd596611986591898ffc92b18442887150

        • C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe

          Filesize

          5.8MB

          MD5

          c2df807d8e539814dd85321ea0322307

          SHA1

          95457f6e38554e56fe99e3332cf5445abf7db626

          SHA256

          6b3996afa4cfd8d3bf11765197880d0768aa0acc3190cf19838ba3bbbd2cff7e

          SHA512

          729eeac68c48f31e395a30dc5e0c4558f0882db83926d8d55c9ea994ea6ba613d9c46591de8840e3f92bd493c0c074cd596611986591898ffc92b18442887150

        • C:\Program Files\ChromeUpdateTaskMachinCore\ORsBHaReETgwnMypRf\ORsBHaReETgwn

          Filesize

          1KB

          MD5

          1a8dee071b86b492e029d23850f41877

          SHA1

          7bf53fab2e89551ea51ac7e41ce3c1d30bfd51de

          SHA256

          5c1ef2e158195fc490f172c7489f8185d8b4e94454829166505c8b9e1ea9c1b5

          SHA512

          4fee823a2e4978ce803b1ba13a20ae6409f1785a3bda1e9aee8b2990a876a9890548d95f9c6c9438221a2f1e94483c1032d50809040bb265552de7daac30e1d8

        • C:\Program Files\ChromeUpdateTaskMachinCore\ORsBHaReETgwnMypRf\hostname

          Filesize

          64B

          MD5

          fb71d58308a46d14ca32170e85b93e00

          SHA1

          d9f04746831d0eecd65804e1552227b45a7bd3a8

          SHA256

          105d6dc6943054fd6187b6ad225685b90447d4ac12c05807a777e35e36968ef5

          SHA512

          aeaaa5ba4e05cbd201e50b7f61bf42e85708c7b5848ab457a80d477686246e64436f8e763e9b58738646bc615e290e7388c44d8a74df54dba738e183ab39cd92

        • C:\Program Files\ChromeUpdateTaskMachinCore\ORsBHaReETgwnMypRf\tor\pluggable_transports\obfs4proxy.exe

          Filesize

          6.6MB

          MD5

          230e3602ebdd05dcf33121eac79d1dcd

          SHA1

          ff93876b412e8fb026fe4bc3105f177402d9e767

          SHA256

          df70d273c43901f7249294ed8f66479b9f5c994db6d0efbbb9b31ad6e8211a6d

          SHA512

          c7f107110f54129636d7ec78ba7ea23ac7ad0e0ace14ada0e1ca3ae66a7dee33c76a8d14ff1e3e945cc47e24e67d911b5ffef45374998383b5453b576d3fde05

        • C:\Program Files\ChromeUpdateTaskMachinCore\ORsBHaReETgwnMypRf\tor\pluggable_transports\obfs4proxy.exe

          Filesize

          6.6MB

          MD5

          230e3602ebdd05dcf33121eac79d1dcd

          SHA1

          ff93876b412e8fb026fe4bc3105f177402d9e767

          SHA256

          df70d273c43901f7249294ed8f66479b9f5c994db6d0efbbb9b31ad6e8211a6d

          SHA512

          c7f107110f54129636d7ec78ba7ea23ac7ad0e0ace14ada0e1ca3ae66a7dee33c76a8d14ff1e3e945cc47e24e67d911b5ffef45374998383b5453b576d3fde05

        • C:\Program Files\ChromeUpdateTaskMachinCore\ORsBHaReETgwnMypRf\tor\tor.exe

          Filesize

          7.4MB

          MD5

          bdce57b5d9974d1c6a75c4529e9f2e83

          SHA1

          bf5125b827a3f05103e1a480b225da8e7cea7049

          SHA256

          6663f24897889210b68f4fcbd86a74d65c25b54c171ce29009f92bf3a8e074b1

          SHA512

          5ea0a7aef154fc77c0a390352bbb1e035fc3814d22327c3338030fd5bd1968496943be02931bcf322e94899f95bf6549581d9f27c66f45d661f422e7bb0139c4

        • C:\Program Files\ChromeUpdateTaskMachinCore\ORsBHaReETgwnMypRf\tor\tor.exe

          Filesize

          7.4MB

          MD5

          bdce57b5d9974d1c6a75c4529e9f2e83

          SHA1

          bf5125b827a3f05103e1a480b225da8e7cea7049

          SHA256

          6663f24897889210b68f4fcbd86a74d65c25b54c171ce29009f92bf3a8e074b1

          SHA512

          5ea0a7aef154fc77c0a390352bbb1e035fc3814d22327c3338030fd5bd1968496943be02931bcf322e94899f95bf6549581d9f27c66f45d661f422e7bb0139c4

        • C:\Users\Admin\AppData\Local\Temp\eXPNQyhWavDsNHlDd

          Filesize

          1KB

          MD5

          1059042bfa8c4a5bc4c5884e42890875

          SHA1

          8d5203929e2c8fc89cd5437845f447a3c57e7f7c

          SHA256

          27885a7265ed01600e4d71ff50792483c82bf020d9913f58d8e18123dcc64a23

          SHA512

          7a554201ffc1fa837c82753fb124ba069ba9c7d90f091505ad5a20096421f1274dd6907f3ab08072d597c4d1a1518f1d6f3e7c7d0cebdc2e6202d3dafae765b2

        • C:\Users\Admin\AppData\Roaming\tor\cached-descriptors.new

          Filesize

          13KB

          MD5

          f09e10829460fc506c5cf7fb43db3194

          SHA1

          a647a07f8f6b9af0a4b40c954ff1cc1472a6ff8b

          SHA256

          0a7ddc2e692368e716ecab3e7d7b7ea54638ccd16959e6bde037827dc7368b7b

          SHA512

          da996dc696ba3cd4885446e52edb3a74530c2da83e04218d49728fc6c330cf1c3dd0dde4c984974eceb273ae03ba559d21f68fc326a0fb84f6d4b252ab2200f8

        • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

          Filesize

          2.3MB

          MD5

          c7fb02ab0dd667c112847537d3127230

          SHA1

          f89e42cbd485144ddcd534c4d990d13006ebd983

          SHA256

          065f920e85885d9a42ce64453e7c9f2988f46d6b7ea1167bb46110b78a1afcbf

          SHA512

          61e9e403da5fec229b244a2c5e489685f7da6aa72b2b1a4d06befef7488e36439e773c6282770cc51222d41a34fd5f7c26ef240dd7ee6878020af29d92fa17f5

        • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

          Filesize

          5.3MB

          MD5

          4c0651b93015d48d7cf5635655005733

          SHA1

          a42828e2daaf39a7fc30f74a77fcbf8e0e116828

          SHA256

          4a28ddb2e2ac2e419ef555878c48e2782a286b036d0a3dcbfd01fe9921a4e15f

          SHA512

          b7be8e824e5209ef85a248e9c5800ddf9a11410add52d43c5759042dca9ec15d2fe6b595c7b562f7034da948d86bdb6c7dd8083fd1807e7fabdacf63ce1c2039